Viking Cipher

Cybersecurity News

Dark Reading

The Hackers News

KrebsOnSecurity

  • Microsoft: 6 Zero-Days in March 2025 Patch Tuesday
    March 11, 2025

    Microsoft today issued more than 50 security updates for its various Windows operating systems, including fixes for a whopping six zero-day vulnerabilities that are already seeing active exploitation....

  • Alleged Co-Founder of Garantex Arrested in India
    March 11, 2025

    Authorities in India today arrested the alleged co-founder of Garantex, a cryptocurrency exchange sanctioned by the U.S. government in 2022 for facilitating tens of billions of dollars in money laundering by transnational criminal and cybercriminal organizations. Sources close to the investigation t...

  • Feds Link $150M Cyberheist to 2022 LastPass Hacks
    March 8, 2025

    In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass in 2022. In a court filing this week, U.S. ...

  • Who is the DOGE and X Technician Branden Spikes?
    March 7, 2025

    At 49, Branden Spikes isn't just one of the oldest technologists who has been involved in Elon Musk's Department of Government Efficiency (DOGE). As the current director of information technology at X/Twitter and an early hire at PayPal, Zip2, Tesla and SpaceX, Spikes is also among Musk�...

  • Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab
    February 28, 2025

    One of the most notorious providers of abuse-friendly "bulletproof" web hosting for cybercriminals has started routing its operations through networks run by the Russian antivirus and security firm Kaspersky Lab, KrebsOnSecurity has learned....

  • U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason”
    February 27, 2025

    A U.S. Army soldier who pleaded guilty last week to leaking phone records for high-ranking U.S. government officials searched online for non-extradition countries and for an answer to the question "can hacking be treason?" prosecutors in the case said Wednesday. The government disclosed th...

  • Trump 2.0 Brings Cuts to Cyber, Consumer Protections
    February 23, 2025

    One month into his second term, President Trump's actions to shrink the government through mass layoffs, firings and withholding funds allocated by Congress have thrown federal cybersecurity and consumer protection programs into disarray. At the same time, agencies are battling an ongoing effor...

  • How Phished Data Turns into Apple & Google Wallets
    February 18, 2025

    Carding -- the underground business of stealing, selling and swiping stolen payment card data -- has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation ...

  • Nearly a Year Later, Mozilla is Still Promoting OneRep
    February 13, 2025

    In mid-March 2024, KrebsOnSecurity revealed that the founder of the personal data removal service Onerep also founded dozens of people-search companies. Shortly after that investigation was published, Mozilla said it would stop bundling Onerep with the Firefox browser and wind down its partnership. ...

  • Microsoft Patch Tuesday, February 2025 Edition
    February 12, 2025

    Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that are being actively exploited....

Wired (Security Section)

HackRead

CyberScoop

Help Net Security

  • Quantifying cyber risk strategies to resonate with CFOs and boards
    March 14, 2025

    In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a more strategic role within their organizations. He explains that aligning cybersecurity with business objectives and leverag...

  • Corero Network Security expands AI capabilities across its portfolio
    March 14, 2025

    Corero Network Security announced the strategic advancement of AI capabilities across its product portfolio and operations—building on a long-standing legacy of intelligent, adaptive security solutions. For years, Corero’s SmartWall ONE platform has delivered automated, real-time DDoS pr...

  • Top 5 threats keeping CISOs up at night in 2025
    March 14, 2025

    Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing AI-driven security, ransomware resilience, supply chain risk management, insider threat mitigation, and compliance preparedn...

  • 94% of Wi-Fi networks lack protection against deauthentication attacks
    March 14, 2025

    A recent report from Nozomi Networks Labs, based on an analysis of over 500,000 wireless networks worldwide, reveals that only 6% are adequately protected against wireless deauthentication attacks. Most wireless networks, including those in mission-critical environments, remain highly exposed to the...

  • New infosec products of the week: March 14, 2025
    March 14, 2025

    Here’s a look at the most interesting products from the past week, featuring releases from Alloy, Detectify, Pondurance, and SimSpace. SimSpace Stack Optimizer allows organizations to measure their security technologies Stack Optimizer is designed to help organizations make informed, strategic dec...

  • How to secure your personal metadata from online trackers
    March 13, 2025

    When it comes to safeguarding your privacy online, most people focus on securing passwords, encrypting communications, and clearing browsing history. While these practices are essential, they overlook one important element—metadata. This data, which is collected about your digital interactions, ca...

  • CISOs, are your medical devices secure? Attackers are watching closely
    March 13, 2025

    The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has also introduced cybersecurity challenges to safeguard patient safety and uphold organizational security. Securing IoMT: Prio...

  • Cybersecurity classics: 10 books that shaped the industry
    March 13, 2025

    Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a CISO, a seasoned expert, or cybersecurity enthusiast, these must-reads belong on your shelf. Masters of Deception: The Gang That...

  • Cybersecurity jobs available right now in Europe: March 13, 2025
    March 13, 2025

    Cloud Security Engineer TUI Group | Portugal | Hybrid – View job details As a Cloud Security Engineer, you will contribute to the implementation of security solutions and will work alongside our Security Operations team to ensure appropriate controls are engineered, addre...

  • Goodbye passwords? Enterprises ramping up passkey adoption
    March 12, 2025

    87% of companies have, or are in the midst of, rolling out passkeys with goals tied to improved user experience, enhanced security, and compliance, according to the FIDO Alliance. Key findings Enterprises understand the value of passkeys for workforce sign-ins. Most decision makers (87%) report depl...

ZDNet (Security Section)

Security Boulevard

  • Reading the Data Breach Tea Leaves: Preventing Data Exfiltration Before it Happens 
    March 14, 2025

    Data exfiltration has traditionally been the end goal among threat actors whether it’s for financial gain, political gain or to simply wreak havoc. The post Reading the Data Breach Tea Leaves: Preventing Data Exfiltration Before it Happens  appeared first on Security Boulevard. ...

  • Savings and Security: The Dual Benefits of FinOps and the Cloud
    March 14, 2025

    Organizations can adopt FinOps, a cloud financial management practice promoting shared accountability among engineering, finance and operations teams to balance innovation, security and cost efficiency. The post Savings and Security: The Dual Benefits of FinOps and the Cloud appeared first on Secur...

  • FCC Takes on China Threats with New National Security Council
    March 14, 2025

    The FCC is launching a new agency council to push back on Chinese-backed cyberthreats like Salt Typhoon by pushing telecoms to harden their defense, reduce their reliance on trade with foreign adversaries, and ensure continued U.S. leadership is key areas like AI, the IoT, quantum computing, and 5G...

  • Strengthening Security in the Cloud Era Requires Network Visibility and Understanding
    March 14, 2025

    Organizations need a seamless, application-focused security strategy that integrates network, identity and data protection into a unified approach. The post Strengthening Security in the Cloud Era Requires Network Visibility and Understanding appeared first on Security Boulevard. ...

  • Cybersecurity Challenges in the Telecom Sector: Protecting Data and Infrastructure 
    March 14, 2025

    The telecommunications sector is the backbone of many processes in life and business and must improve its cybersecurity posture. The post Cybersecurity Challenges in the Telecom Sector: Protecting Data and Infrastructure  appeared first on Security Boulevard. ...

  • One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild
    March 14, 2025

    A devastating new remote code execution (RCE) vulnerability, CVE-2025-24813, is now actively exploited in the wild. Attackers need just one PUT API request to take over vulnerable Apache Tomcat servers. The exploit, originally published by a Chinese forum user iSee857, is already available online: C...

  • Boards Challenged to Embrace Cybersecurity Oversight
    March 14, 2025

    Integrating Cyber Risk into Business Risk Decisions Cybersecurity failures are now business risks that CEOs and Boards must own. The world of business owners, investors, and their representatives are collectively realizing the potentially catastrophic impacts of cybersecurity incidents if not in...

  • How can I integrate automated NHI auditing into our pipeline?
    March 13, 2025

    How Can Automated NHI Auditing Enhance Your Cybersecurity Strategy? Is your organization struggling with managing the ever-increasing volume of Non-Human Identities (NHIs) within your IT infrastructure? The NHI universe comprises machine identities created by combining a unique identifier or ‘Secr...

  • What security considerations should I keep in mind for NHI automation?
    March 13, 2025

    Why are Security Considerations Essential for Non-Human Identities Automation? The age of automation has dawned upon us. Automation carries the promise of immense business benefits, yet, it brings forth its own set of security challenges. For organizations heavily invested in leveraging Non-Human Id...

  • What role do APIs play in automating NHI management?
    March 13, 2025

    Could API Automation Be The Missing Piece In Your NHI Management? One critical question stands out: Could the underutilized potential of API automation be the missing piece in your Non-Human Identities (NHI) management strategy? With the increasing complexity of cloud environments and the mounting d...